An Iran-linked threat actor tracked as Agrius employed data-wipers disguised as ransomware to destroy targeted IT infrastructure. Researchers from cyber-security…
A flaw in Pulse Connect Secure VPN could allow an authenticated remote attacker to execute arbitrary code with elevated privileges.…
Trend Micro fixed some flaws in Trend Micro Home Network Security devices that could be exploited to elevate privileges or…
Apple has addressed three zero-day vulnerabilities in macOS and tvOS actively exploited in the wild by threat actors. Apple has…
The audio equipment manufacturer Bose Corporation said it was the victim of a ransomware attack that took place earlier this…
US banks are giving the green light to the adoption of facial recognition technology, while authorities provide regulations and updates…
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at…
Operators behind the Zeppelin ransomware-as-a-service (RaaS) have resumed their operations after a temporary interruption. Researchers from BleepingComputer reported that operators…
Researchers disclosed details about 13 vulnerabilities in the Nagios network monitoring application that could be exploited for malicious purposes. Cybersecurity…
A misconfiguration issue in the software used by the Eufy video camera exposed private information and video streams of customers.…
This website uses cookies.